Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

IoT Security

Owl Labs Patches Severe Vulnerability in Video Conferencing Devices

Video conferencing company Owl Labs has released patches for a severe vulnerability affecting its Meeting Owl Pro and Whiteboard Owl devices.

Video conferencing company Owl Labs has released patches for a severe vulnerability affecting its Meeting Owl Pro and Whiteboard Owl devices.

Owl Labs’ Meeting Owl Pro features a 360° lens camera to offer a panoramic view of the conference room. It offers support for various video conferencing solutions, including Zoom, Skype, and Google Meet.

Security researchers with Modzero have identified multiple vulnerabilities in Owl’s devices, warning that they could be exploited to find registered devices worldwide and access sensitive data, or even gain access to the owners’ networks.

The researchers discovered five vulnerabilities in Meeting Owl Pro: CVE-2022-31459, CVE-2022-31460, CVE-2022-31461 (CVSS score of 7.4), CVE-2022-31463 (CVSS score of 8.2), and CVE-2022-31462 (CVSS score of 9.3).

All of these issues, the researchers say, are related to hardcoded credentials – Meeting Owl Pro creates its own Wi-Fi access point with the hardcoded passcode “hoothoot” – and impact the communication between the Meeting Owl Pro device and its companion application and backend server, as well as the web apps used for managing Meeting Owl devices.

On Monday, Owl Labs announced the availability of patches for CVE-2022-31460, a high-severity bug that allows an attacker within Bluetooth range to turn the Meeting Owl device into a rogue access point to the owner’s network.

The issue exists because, when in AP mode, the device remains connected to the Wi-Fi network and routes all traffic to the network instead of allowing only connections to the Owl itself, Modzero explains. The vulnerability can be exploited without authentication.

On Monday, Owl Labs announced firmware version 5.4.1.4 for both Meeting Owl Pro and Whiteboard Owl, to disable “the passthrough of networking traffic in Wi-Fi AP tethering mode,” thus preventing the use of these devices as wireless access points.

Advertisement. Scroll to continue reading.

The remaining flaws, the company says, are expected to be resolved with future updates. The company also notes that all devices should be protected against potential exploitation attempts once updated to 5.4.1.4.

“To be clear, once software version 5.4.1.4 is applied, there is no risk of unauthorized network access due to the above CVEs. The Owl PIN issues are low risk and would allow someone to access per-meeting default-meeting settings only (for example: Presenter Enhance, 360-degree Pano on/off), and require them to be within Bluetooth range,” the company said.

The unresolved issues expose the device’s internal Switchboard (allowing an attacker to perform actions supported by the companion app), and allow for access to Bluetooth-exposed functionality without authentication and for the deactivation of the passcode without authentication.

The most severe of these issues, CVE-2022-31462, is the presence of a hardcoded backdoor passcode that “can be calculated from information that is visible in Bluetooth Low Energy proximity range.”

This hardcoded passcode “is the SHA-1 has representation of the devices’ software serial, which is broadcasted as the name of the Owl over Bluetooth,” the researchers explain.

On Tuesday, the US Cybersecurity and Infrastructure Security Agency (CISA) encouraged Owl device owners to update to firmware version 5.4.1.4.

“Owl Labs has released security updates to address a vulnerability (CVE-2022-31460) in Meeting Owl Pro and Whiteboard Owl. An attacker could exploit this vulnerability to obtain sensitive information,” CISA said.

Related: Technical Details Released for Recently Patched Zyxel Firewall Vulnerabilities

Related: CISA Warns of Critical Vulnerabilities in Illumina Genetic Analysis Devices

Related: NSA Informs Cisco of Vulnerability Exposing Nexus Switches to DoS Attacks

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Mike Dube has joined cloud security company Aqua Security as CRO.

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.